Which of the following would BEST improve security while meeting these requirements?
A security architect has been assigned to a new digital transformation program. The objectives are to provide better capabilities to customers and reduce costs. The program has highlighted the following requirements: ✑ Long-lived sessions are required, as users do not log in very often. ✑ The solution has multiple SPs,...
Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?
An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations. Which of the...
Which of the following strategies should the engineer recommended be approved FIRST?
In the past, the risk committee at Company A has shown an aversion to even minimal amounts of risk acceptance. A security engineer is preparing recommendations regarding the risk of a proposed introducing legacy ICS equipment. The project will introduce a minor vulnerability into the enterprise. This vulnerability does not...
To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take?
A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password...
Which of the following should the analyst use to confirm this suspicion?
A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the...
Which of the following cloud and visualization considerations would BEST address the issue presented in this scenario?
A company's human resources department recently had its own shadow IT department spin up ten VMs that host a mixture of differently labeled data types (confidential and restricted) on the same VMs. Which of the following cloud and visualization considerations would BEST address the issue presented in this scenario?A ....
Which of the following represents the BEST solution for preventing future fines?
Providers at a healthcare system with many geographically dispersed clinics have been fined five times this year after an auditor received notice of the following SMS messages: Which of the following represents the BEST solution for preventing future fines?A . Implement a secure text-messaging application for mobile devices and workstations.B...
Which of the following would be the BEST advice for the security engineer to give to the developer?
A security engineer is assisting a developer with input validation, and they are studying the following code block: The security engineer wants to ensure strong input validation is in place for customer-provided account identifiers. These identifiers are ten-digit numbers. The developer wants to ensure input validation is fast because a...
CORRECT TEXT
CORRECT TEXT View AnswerAnswer: Step 1: Verify that the certificate is valid or not. In case of any warning message, cancel the download. Step 2: If certificate issue is not there then, download the file in your system. Step 3: Calculate the hash value of the downloaded file. Step 4:...
A security assessor is working with an organization to review the policies and procedures associated with managing the organization’s virtual infrastructure. During a review of the virtual environment, the assessor determines the organization is using servers to provide more than one primary function, which violates a regulatory requirement. The assessor reviews hardening guides and determines policy allows for this configuration.
A security assessor is working with an organization to review the policies and procedures associated with managing the organization’s virtual infrastructure. During a review of the virtual environment, the assessor determines the organization is using servers to provide more than one primary function, which violates a regulatory requirement. The assessor...